General

  • Target

    424837df31cc4e1161d0329c7ec5995b76747662ff8fc633d99ff7f95f3ca9fa

  • Size

    878KB

  • Sample

    220418-pwav9sbae8

  • MD5

    0e26ef9a028fbc3deb0a67809b5ce0cb

  • SHA1

    2ea7ed61e3327d8255d4b0bafa6b87873ee5dbf4

  • SHA256

    424837df31cc4e1161d0329c7ec5995b76747662ff8fc633d99ff7f95f3ca9fa

  • SHA512

    5f554de99249785334a02f29b8650979d7263a2367de9858c21eaf61caaf211c44872beb01573371f6b34c5673d0a56962a9a1cef03807c9148facd63a723ff9

Malware Config

Targets

    • Target

      424837df31cc4e1161d0329c7ec5995b76747662ff8fc633d99ff7f95f3ca9fa

    • Size

      878KB

    • MD5

      0e26ef9a028fbc3deb0a67809b5ce0cb

    • SHA1

      2ea7ed61e3327d8255d4b0bafa6b87873ee5dbf4

    • SHA256

      424837df31cc4e1161d0329c7ec5995b76747662ff8fc633d99ff7f95f3ca9fa

    • SHA512

      5f554de99249785334a02f29b8650979d7263a2367de9858c21eaf61caaf211c44872beb01573371f6b34c5673d0a56962a9a1cef03807c9148facd63a723ff9

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks